共 27 条
[1]
[Anonymous], 2013, IACR Cryptol. ePrint Arch.
[2]
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[3]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]
Bosch Christoph, 2011, Secure Data Management. Proceedings 8th VLDB Workshop (SDM2011), P114, DOI 10.1007/978-3-642-23556-6_8
[8]
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[10]
Fangming Zhao, 2012, Information Security and Cryptology - ICISC 2011. 14th International Conference. Revised Selected Papers, P406, DOI 10.1007/978-3-642-31912-9_27